Board members will often say that a cyber attack is top of their ‘worry-list’. Richard Hollis explains that 84% of cyber-attacks occur at the application layer. He adds that this is the easiest to attack and the hardest to defend as it is the most exposed and accessible. Consequently, applications are the primary attack vectors for threat actors today. He suggests a straightforward and pragmatic 4-step process for ensuring the security integrity of business-critical applications prior to launch.
Read MoreRichard Hollis